10081 |
2024-05-05 10:39
|
yileyou.exe 621aff451af46a3e94ede2ebfcb96dc6 Generic Malware Malicious Library UPX Malicious Packer PE File PE32 OS Processor Check VirusTotal Malware PDB Check memory Checks debugger Creates executable files Check virtual network interfaces RCE DNS |
|
4
safe.jmnu.com(121.61.248.93) 121.61.248.93 172.67.169.18 172.67.177.134
|
|
|
5.6 |
M |
39 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10082 |
2024-05-05 10:39
|
yungengxin.exe 39bd6fd27d2093d5867143d759942251 Generic Malware Malicious Library UPX Malicious Packer PE File PE32 OS Processor Check VirusTotal Malware PDB Check memory Checks debugger Creates executable files unpack itself Check virtual network interfaces RCE |
|
2
safe.jmnu.com(121.61.248.93) 121.61.248.93
|
|
|
5.4 |
M |
39 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10083 |
2024-05-05 10:38
|
svchosc.exe aa566acaa8b6baaa830aff78d45501a1 Generic Malware Malicious Library Downloader Malicious Packer UPX ScreenShot KeyLogger AntiDebug AntiVM PE File DllRegisterServer dll PE32 OS Processor Check VirusTotal Malware Code Injection unpack itself malicious URLs sandbox evasion Browser DNS |
|
8
2560.posyun-cloud2.com() 2560.posyun-cloud3.com() 2560.shouyi555.com() 2560.posyun-cloud1.com() 2560.posyun-cloud4.com() 2560.posyun-cloud.com() 123.60.53.228 114.116.234.50
|
|
|
7.4 |
|
57 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10084 |
2024-05-05 10:38
|
syncq.exe 9d13ef960c157624ac37ab30b76d26d0 Malicious Library .NET framework(MSIL) UPX PE File .NET EXE PE32 OS Processor Check VirusTotal Malware Check memory Checks debugger unpack itself |
|
|
|
|
2.0 |
|
58 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10085 |
2024-05-05 10:34
|
cyber2019.exe 813b31f7ee7bbdd8e42890394ea6f16f Generic Malware UltraVNC Malicious Library UPX Malicious Packer VMProtect Anti_VM PE File PE32 OS Processor Check MZP Format DLL ftp VirusTotal Malware PDB Checks debugger Creates executable files unpack itself sandbox evasion WriteConsoleW crashed |
|
|
|
|
5.6 |
|
50 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10086 |
2024-05-05 10:33
|
T76434567000.exe fbccdd35ee6dccadaeaa69e37fbbd171 Generic Malware Suspicious_Script_Bin Malicious Library UPX PE File PE32 OS Processor Check Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware AutoRuns suspicious privilege Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Check virtual network interfaces AppData folder IP Check Tofsee Windows Browser Email ComputerName DNS Cryptographic key DDNS Software crashed keylogger |
3
http://checkip.dyndns.org/ https://scratchdreams.tk/_send_.php?TS https://reallyfreegeoip.org/xml/175.208.134.152
|
6
scratchdreams.tk(172.67.169.18) reallyfreegeoip.org(172.67.177.134) checkip.dyndns.org(132.226.8.169) 193.122.6.168 172.67.169.18 172.67.177.134
|
7
ET DNS Query to a .tk domain - Likely Hostile ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org) ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI ET POLICY External IP Lookup - checkip.dyndns.org ET INFO 404/Snake/Matiex Keylogger Style External IP Check
|
|
11.0 |
|
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10087 |
2024-05-05 10:17
|
ExcUserFault_imagent-2024-04-2... 1194e4a6c9cc73464db69aed6aa4dedd AntiDebug AntiVM Email Client Info Stealer suspicious privilege Checks debugger Creates shortcut unpack itself installed browsers check Browser Email ComputerName |
|
|
|
|
3.4 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10088 |
2024-05-04 14:26
|
master.exe eb508c21c59a7fff7924f7243e5949e8 Generic Malware Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware |
|
|
|
|
1.8 |
M |
51 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10089 |
2024-05-04 14:24
|
hotstuffnewrdp.vbs bf7046a9d40c33822cbf5dea1c9629ecVirusTotal Malware VBScript wscript.exe payload download Creates shortcut Check virtual network interfaces Tofsee DNS Dropper |
1
|
3
paste.ee(172.67.187.200) - mailcious 104.26.13.205 172.67.187.200 - mailcious
|
2
ET POLICY Pastebin-style Service (paste .ee) in TLS SNI SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
10.0 |
M |
11 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10090 |
2024-05-04 14:24
|
Archivenfromationalprotectiont... 2b9ab36214ca6de144e42468706d2c64 MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware Malicious Traffic RWX flags setting exploit crash Tofsee Exploit DNS crashed |
3
http://apps.identrust.com/roots/dstrootcax3.p7c http://192.3.243.154/ArchiveJs.js https://paste.ee/d/gsMxf
|
6
paste.ee(172.67.187.200) - mailcious uploaddeimagens.com.br(104.21.45.138) - malware 192.3.243.154 - malware 61.111.58.34 - malware 104.21.84.67 - malware 172.67.215.45 - malware
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY Pastebin-style Service (paste .ee) in TLS SNI
|
|
4.6 |
M |
38 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10091 |
2024-05-04 14:22
|
wewanthowthemagicalwordshappen... b113b57d6e1f23380163d91dcfa68a5a MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware VBScript Malicious Traffic buffers extracted exploit crash unpack itself Tofsee Exploit DNS crashed |
1
|
3
paste.ee(172.67.187.200) - mailcious 104.21.84.67 - malware 192.3.101.142 - malware
|
3
ET POLICY Pastebin-style Service (paste .ee) in TLS SNI SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO Dotted Quad Host VBS Request
|
|
5.0 |
M |
38 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10092 |
2024-05-04 14:21
|
yohan.exe 7f991bd7699126d6cca12241de7e7c44 Generic Malware Malicious Library Malicious Packer UPX PE File PE32 OS Processor Check VirusTotal Malware Checks debugger Disables Windows Security Windows DNS |
|
1
|
|
|
4.4 |
M |
48 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10093 |
2024-05-04 14:20
|
prnportsixinfromationalprotect... 49e3c07508aa3f53a67fbec97fa07dc1 MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware VBScript Malicious Traffic exploit crash unpack itself Tofsee Exploit DNS crashed |
3
http://apps.identrust.com/roots/dstrootcax3.p7c http://192.3.243.154/prnport.vbs https://paste.ee/d/MHUUd
|
6
paste.ee(104.21.84.67) - mailcious uploaddeimagens.com.br(104.21.45.138) - malware 192.3.243.154 - malware 104.21.84.67 - malware 61.111.58.35 - malware 172.67.215.45 - malware
|
3
ET POLICY Pastebin-style Service (paste .ee) in TLS SNI SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO Dotted Quad Host VBS Request
|
|
4.6 |
M |
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10094 |
2024-05-04 14:19
|
youhaveonefilefortody.vbs d8042714120e0e780d00490e045a2816VirusTotal Malware VBScript wscript.exe payload download Creates shortcut Check virtual network interfaces Tofsee Dropper |
1
|
2
paste.ee(172.67.187.200) - mailcious 104.21.84.67 - malware
|
2
ET POLICY Pastebin-style Service (paste .ee) in TLS SNI SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
10.0 |
M |
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10095 |
2024-05-04 14:18
|
shelovedsomeonetounderstandthe... a2b050f9634ea0c8cb1456e13b59b505 MS_RTF_Obfuscation_Objects RTF File doc Malware download VirusTotal Malware Malicious Traffic buffers extracted exploit crash unpack itself IP Check Tofsee Windows Exploit DNS crashed Downloader |
1
|
3
api.ipify.org(172.67.74.152) 192.3.239.4 - mailcious 104.26.13.205
|
9
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup ET INFO Executable Download from dotted-quad Host ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET POLICY PE EXE or DLL Windows file download HTTP ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
|
|
5.4 |
M |
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|